Information

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 417 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score

Your score

Categories

Not categorized0%

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

Answered

Review

Question 1 of 417

1. Question

Which technology supports the stateless assignment of IPv6 addresses?

DNS

DHCPv6

DHCP

autoconfiguration

Correct

Incorrect

Hint

DHCPv6 Technology Overview
IPv6 Internet Address Assignment Overview
IPv6 has been developed with Internet Address assignment dynamics in mind. Being aware that IPv6 Internet addresses are 128 bits in length and written in hexadecimals makes automation of address- assignment an important aspect within network design. These attributes make it inconvenient for a user to manually assign IPv6 addresses, as the format is not naturally intuitive to the human eye. To facilitate address assignment with little or no human intervention, several methods and technologies have been developed to automate the process of address and configuration parameter assignment to IPv6 hosts. The various IPv6 address assignment methods are as follows:

1. Manual Assignment
An IPv6 address can be statically configured by a human operator. However, manual assignment is quite
open to errors and operational overhead due to the 128 bit length and hexadecimal attributes of the addresses, although for router interfaces and static network elements and resources this can be an appropriate solution.
2. Stateless Address Autoconfiguration (RFC2462)
Stateless Address Autoconfiguration (SLAAC) is one of the most convenient methods to assign Internet
addresses to IPv6 nodes. This method does not require any human intervention at all from an IPv6 user. If one wants to use IPv6 SLAAC on an IPv6 node, it is important that this IPv6 node is connected to a network with at least one IPv6 router connected. This router is configured by the network administrator and sends out Router Advertisement announcements onto the link. These announcements can allow the on-link connected IPv6 nodes to configure themselves with IPv6 address and routing parameters, as specified in RFC2462, without further human intervention.
3. Stateful DHCPv6
The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) has been standardized by the IETF through
RFC3315. DHCPv6 enables DHCP servers to pass configuration parameters, such as IPv6 network addresses, to IPv6 nodes. It offers the capability of automatic allocation of reusable network addresses and additional configuration flexibility. This protocol is a stateful counterpart to “IPv6 Stateless Address Autoconfiguration” (RFC 2462), and can be used separately, or in addition to the stateless autoconfiguration to obtain configuration parameters.
4. DHCPv6-PD
DHCPv6 Prefix Delegation (DHCPv6-PD) is an extension to DHCPv6, and is specified in RFC3633. Classical
DHCPv6 is typically focused upon parameter assignment from a DHCPv6 server to an IPv6 host running a DHCPv6 protocol stack. A practical example would be the stateful address assignment of “2001:db8::1” from a DHCPv6 server to a DHCPv6 client. DHCPv6-PD however is aimed at assigning complete subnets and other network and interface parameters from a DHCPv6-PD server to a DHCPv6-PD client. This means that instead of a single address assignment, DHCPv6-PD will assign a set of IPv6 “subnets”. An example could be the assignment of “2001:db8::/60” from a DHCPv6-PD server to a DHCPv6-PD client. This will allow the DHCPv6-PD client (often a CPE device) to segment the received address IPv6 address space, and assign it dynamically to its IPv6 enabled interfaces.
5. Stateless DHCPv6

Stateless DHCPv6 is a combination of “stateless Address Autoconfiguration” and “Dynamic Host Configuration Protocol for IPv6” and is specified by RFC3736. When using stateless-DHCPv6, a device will use Stateless Address Auto-Configuration (SLAAC) to assign one or more IPv6 addresses to an interface, while it utilizes DHCPv6 to receive “additional parameters” which may not be available through SLAAC. For example, additional parameters could include information such as DNS or NTP server addresses, and are provided in a stateless manner by DHCPv6. Using stateless DHCPv6 means that the DHCPv6 server does not need to keep track of any state of assigned IPv6 addresses, and there is no need for state refreshment as result. On network media supporting a large number of hosts associated to a single DHCPv6 server, this could mean a significant reduction in DHCPv6 messages due to the reduced need for address state refreshments. From Cisco IOS 12.4(15)T onwards the client can also receive timing information, in addition to the “additional parameters” through DHCPv6. This timing information provides an indication to a host when it should refresh its DHCPv6 configuration data. This behavior (RFC4242) is particularly useful in unstable environments where changes are likely to occur.

Question 2 of 417

2. Question

What are two requirements for an HSRP group? (Choose two.)

exactly one active router

one or more standby routers

one or more backup virtual routers

exactly one standby active router

exactly one backup virtual router

Correct

Incorrect

Hint

Using HSRP, a set of routers works in concert to present the illusion of a single virtual router to the hosts on the LAN. This set is known as an HSRP group or a standby group. A single router elected from the group is responsible for forwarding the packets that hosts send to the virtual router. This router is known as the Active router. Another router is elected as the Standby router. In the event that the Active router fails, the Standby assumes the packet-forwarding duties of the Active router. Although an arbitrary number of routers may run HSRP, only the Active router forwards the packets sent to the virtual router.
To minimize network traffic, only the Active and Standby routers send periodic HSRP messages once the protocol has completed the election process. If the Active router fails, the Standby router takes over as the Active router. If the Standby router fails or becomes the Active router, then another router is elected as the Standby router.
On a particular LAN, multiple hot standby groups may coexist and overlap. Each standby group emulates a single virtual router. The individual routers may participate in multiple groups. In this case, the router maintains separate state and timers for each group.
Each standby group has a single, well-known MAC address, as well as an IP address.

Question 3 of 417

3. Question

After you configure the Loopback0 interface, which command can you enter to verify the status of the interface and determine whether fast switching is enabled?

5. Question

Which three commands can you use to set a router boot image? (Choose three.)

Router(config)# boot system flash c4500-p-mz.121-20.bin

Router(config)# boot system tftp c7300-js-mz.122-33.SB8a.bin

Router(config)#boot system rom c7301-advipservicesk9-mz.124-24.T4.bin

Router> boot flash:c180x-adventerprisek9-mz-124-6T.bin

Router(config)#boot flash:c180x-adventerprisek9-mz-124-6T.bin

Router(config)#boot bootldr bootflash:c4500-jk9s-mz.122-23f.bin

Correct

Incorrect

Question 6 of 417

6. Question

Which two statements about IPv6 and routing protocols are true? (Choose two.)

Link-local addresses are used to form routing adjacencies.

OSPFv3 was developed to support IPv6 routing.

EIGRP, OSPF, and BGP are the only routing protocols that support IPv6.

Loopback addresses are used to form routing adjacencies.

EIGRPv3 was developed to support IPv6 routing.

Correct

Incorrect

Question 7 of 417

7. Question

If primary and secondary root switches with priority 16384 both experience catastrophic losses, which tertiary switch can take over?

a switch with priority 20480

a switch with priority 8192

a switch with priority 4096

a switch with priority 12288

Correct

Incorrect

Question 8 of 417

8. Question

Which two statements about late collisions are true? (Choose two.)

They indicate received frames that did not pass the FCS match.

They may indicate a duplex mismatch.

By definition, they occur after the 512th bit of the frame has been transmitted.

They are frames that exceed 1518 bytes.

They occur when CRC errors and interference occur on the cable.

Correct

Incorrect

Question 9 of 417

9. Question

Which command can you enter to set the default route for all traffic to an interface?

router(config)#ip route 0.0.0.0 255.255.255.255 GigabitEthernet0/1

router(config-router)#default-information originate

router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1

router(config-router)#default-information originate always

Correct

Incorrect

Question 10 of 417

10. Question

Which two spanning-tree port states does RSTP combine to allow faster convergence? (Choose two.)

blocking

learning

listening

forwarding

discarding

Correct

Incorrect

Question 11 of 417

11. Question

If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router?

1

2

4

8

Correct

Incorrect

Question 12 of 417

12. Question

The left describes the types of cables, while the right describes the purposes of the cables. Drag the items on the left to the proper locations. (Not all items can be used.) (THE COMMUNITY SHARED THAT THERE IS ANOTHER OPTION SO STUDY ALL OF WHAT THIS CABLES ARE FOR)

Sort elements

straight-through

crossover

rollover

null modem

9-25 pin serial

switch access port to router

switch to switch

PC COM to Switch Console Port

Correct

Incorrect

Question 13 of 417

13. Question

Match the items on the left with appropriate OSI layer on the right. (Not all options are used.)

Sort elements

packets

IP address

routing

udp

segments

windowing

bits

MAC address

switching

Network Layer

Network Layer

Network Layer

Transport Layer

Transport Layer

Transport Layer

Correct

Incorrect

Question 14 of 417

14. Question

Which command enables IPv6 forwarding on a Cisco router?

ipv6 local

ipv6 host

ipv6 unicast-routing

ipv6 neighbor

Correct

Incorrect

Question 15 of 417

15. Question

Refer to the exhibit. What is the most appropriate summarization for these routes?

10.0.0.0 /21

10.0.0.0 /22

10.0.0.0 /23

10.0.0.0 /24

Correct

Incorrect

Hint

Explanation:
The 10.0.0.0/22 subnet mask will include the 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 networks, and only those four networks.

Question 16 of 417

16. Question

Which set of commands is recommended to prevent the use of a hub in the access layer?

17. Question

A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?

the OSPF route

the EIGRP route

the RIPv2 route

all three routes

the OSPF and RIPv2 routes

Correct

Incorrect

Question 18 of 417

18. Question

Two routers named Atlanta and Brevard are connected via their serial interfaces as illustrated, but they are unable to communicate. The Atlanta router is known to have the correct configuration.

Given the partial configurations, identify the fault on the Brevard router that is causing the lack of connectivity

incompatible IP address

insufficient bandwidth

incorrect subnet mask

incompatible encapsulation

link reliability too low

IPCP closed

Correct

Incorrect

Question 19 of 417

19. Question

A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?

VLANs allow access to network services based on department, not physical location.

VLANs can greatly simplify adding, moving, or changing hosts on the network.

Correct

Incorrect

Question 30 of 417

30. Question

Refer to the exhibit. The output that is shown is generated at a switch. Which three statements are true? (Choose three.)

All ports will be in a state of discarding, learning, or forwarding.

Thirty VLANs have been configured on this switch.

The bridge priority is lower than the default value for spanning tree.

All interfaces that are shown are on shared media.

All designated ports are in a forwarding state.

This switch must be the root bridge for all VLANs on this switch.

Correct

Incorrect

Question 31 of 417

31. Question

Which two commands can be used to verify a trunk link configuration status on a given Cisco switch interface? (Choose two.)

show interface trunk

show interface interface

show ip interface brief

show interface vlan

show interface switchport

Correct

Incorrect

Question 32 of 417

32. Question

Which two states are the port states when RSTP has converged? (Choose two.)

discarding

listening

learning

forwarding

disabled

Correct

Incorrect

Question 33 of 417

33. Question

Refer to the exhibit. A technician has installed Switch B and needs to configure it for remote access from the management workstation connected to Switch A . Which set of commands is required to accomplish this task?

Switches that are configured with VLANs make forwarding decisions based on both Layer 2 and Layer 3 address information.

Microsegmentation decreases the number of collisions on the network.

In a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port.

If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.

Correct

Incorrect

Question 37 of 417

37. Question

Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.)

The transport layer divides a data stream into segments and may add reliability and flow control information.

The data link layer adds physical source and destination addresses and an FCS to the segment.

Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.

Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

The presentation layer translates bits into voltages for transmission across the physical link.

Correct

Incorrect

Question 38 of 417

38. Question

Which of the following describes the roles of devices in a WAN? (Choose three.)

A CSU/DSU terminates a digital local loop.

A modem terminates a digital local loop.

A CSU/DSU terminates an analog local loop.

A modem terminates an analog local loop.

A router is commonly considered a DTE device.

A router is commonly considered a DCE device.

Correct

Incorrect

Question 39 of 417

39. Question

Which interface counter can you use to diagnose a duplex mismatch problem?

no carrier

late collisions

giants

CRC errors

deferred

runts

Correct

Incorrect

Question 40 of 417

40. Question

Which feature can you implement to reserve bandwidth for VoIP calls across the call path?

PQ

CBWFQ

round robin

RSVP

Correct

Incorrect

Question 41 of 417

41. Question

When an interface is configured with PortFast BPDU guard, how does the interface respond when it receives a BPDU?

It continues operating normally.

It goes into a down/down state.

It becomes the root bridge for the configured VLAN.

It goes into an errdisable state.

Correct

Incorrect

Question 42 of 417

42. Question

What are three characteristics of the TCP protocol? (Choose three.)

It uses a single SYN-ACK message to establish a connection.

The connection is established before data is transmitted.

It ensures that all data is transmitted and received by the remote device.

It supports significantly higher transmission speeds than UDP.

It requires applications to determine when data packets must be retransmitted.

It uses separate SYN and ACK messages to establish a connection.

Correct

Incorrect

Question 43 of 417

43. Question

Which command can you enter to determine whether serial interface 0/2/0 has been configured using HDLC encapsulation?

44. Question

Which two statements about IPv4 multicast traffic are true? (Choose two.)

It burdens the source host without affecting remote hosts.

It uses a minimum amount of network bandwidth.

It is bandwidth-intensive.

It simultaneously delivers multiple streams of data.

It is the most efficient way to deliver data to multiple receivers.

Correct

Incorrect

Hint

http://www.cisco.com/c/dam/en_us/about/ciscoitatwork/downloads/ciscoitatwork/pdf/cisco_it_case_study_multicast.pdf
Cisco IOS IP Multicast in the Cisco Network
“IP Multicast as defined in RFC1112, the standard for IP Multicast across networks and the Internet, supports one-to-many content needs by delivering application-source traffic to multiple users without burdening the source or the network, using a minimum amount of network bandwidth. At the point where paths diverge, Cisco routers replace IP Multicast packets in the network, resulting in the most efficient delivery of data to multiple receivers.”

Even low-bandwidth applications can benefit fro IP Multicast when there are thousands of receivers. High-bandwidth applications, such as MPEG video, may need a large portion of the available network bandwidth for a
single stream. In these applications, IP Multicast is the only way to efficiently send the same content to more than one
receiver simultaneously, because it makes sure that only one copy of the data stream is sent across any one network
link. It relies on each router in the stream to intelligently copy the data stream whenever it needs to deliver it to
multiple receivers.

Question 45 of 417

45. Question

What are two benefits of private IPv4 IP addresses? (Choose two.)

They are routed the same as public IP addresses.

They are less costly than public IP addresses.

They can be assigned to devices without Internet connections.

They eliminate the necessity for NAT policies.

They eliminate duplicate IP conflicts.

Correct

Incorrect

Question 46 of 417

46. Question

What is the authoritative source for an address lookup?

a recursive DNS search

the operating system cache

the ISP local cache

the browser cache

Correct

Incorrect

Question 47 of 417

47. Question

Which command can you enter to verify that a BGP connection to a remote device is established?

show ip bgp summary

show ip community-list

show ip bgp paths

show ip route

Correct

Incorrect

Question 48 of 417

48. Question

During which phase of PPPoE is PPP authentication performed ?

the PPP Session phase

Phase 2

the Active Discovery phase

the Authentication phase

Phase 1

Correct

Incorrect

Question 49 of 417

49. Question

Which three circumstances can cause a GRE tunnel to be in an up/down state? (Choose three.)

The tunnel interface IP address is misconfigured.

The tunnel interface is down.

A valid route to the destination address is missing from the routing table.

The tunnel address is routed through the tunnel itself.

The ISP is blocking the traffic.

An ACL is blocking the outbound traffic.

Correct

Incorrect

Question 50 of 417

50. Question

Which two statements about using leased lines for your WAN infrastructure are true? (Choose two.)

Leased lines provide inexpensive WAN access.

Leased lines with sufficient bandwidth can avoid latency between endpoints.

Leased lines require little installation and maintenance expertise.

Leased lines provide highly flexible bandwidth scaling.

Multiple leased lines can share a router interface.

Leased lines support up to T1 link speeds.

Correct

Incorrect

Hint

from W.Odom Official Cert Guide for ICND1 v3

Telcos offer a wide variety of speeds for leased lines. However, you cannot pick the exact
speed you want; instead, you must pick from a long list of predefined speeds. Slower-speed
links run at multiples of 64 kbps (kilobits per second), while faster links run at multiples of
about 1.5 Mbps (megabits per second).

Leased lines have many benefits that have led to their relatively long life in the WAN mar-
ketplace. These lines are simple for the customer, are widely available, are of high quality,
and are private. However, they do have some negatives as well compared to newer WAN
technologies, including a higher cost and typically longer lead times to get the service
installed.

Question 51 of 417

51. Question

Which two statements about wireless LAN controllers are true? (Choose two.)

They can simplify the management and deployment of wireless LANs.

They rely on external firewalls for WLAN security.

They are best suited to smaller wireless networks.

They must be configured through a GUI over HTTP or HTTPS.

They can manage mobility policies at a systemwide level.

Correct

Incorrect

Question 52 of 417

52. Question

Which two statements about northbound and southbound APIs are true? (Choose two.)

Only southbound APIs allow program control of the network.

Only northbound APIs allow program control of the network.

Only southbound API interfaces use a Service Abstraction Layer.

Only northbound API interfaces use a Service Abstraction Layer.

Both northbound and southbound API interfaces use a Service Abstraction Layer.

Both northbound and southbound APIs allow program control of the network.

Correct

Incorrect

Question 53 of 417

53. Question

Which command can you enter to set the default route for all traffic to an interface?

router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1

router(config-router)#default-information originate always

router(config)#ip route 0.0.0.0 255.255.255.255 GigabitEthernet0/1

route(config-router)#default-information originate

Correct

Incorrect

Question 54 of 417

54. Question

Which statement about RADIUS security is true?

It supports EAP authentication for connecting to wireless networks.

It provides encrypted multiprotocol support.

Device-administration packets are encrypted in their entirety.

It ensures that user activity is fully anonymous.

Correct

Incorrect

Question 55 of 417

55. Question

If you are configuring syslog messages specifying `logging trap warning’, which log messages will the router send?

Hint

http://www.ieee802.org/3/
CSMA/CD – It uses a carrier sensing scheme in which a transmitting station detects collisions by sensing transmissions from other stations while transmitting a frame. When this collision condition is detected, the station stops transmitting that frame.

63. Question

64. Question

Which mode is compatible with Trunk, Access, and desirable ports?

Trunk Ports

Access Ports

Dynamic Auto

Dynamic Desirable

Correct

Incorrect

Hint

Explanation from http://www.9tut.com/trunking-questions
Maybe this question wanted to ask “if the other end is configured with trunk/access/desirable mode” then which mode is compatible so that the link can work. In that case both “dynamic auto” and “dynamic desirable” mode are correct. The difference between these two modes is “dynamic auto” is passively waiting for the other end to request to form a trunk while “dynamic desirable” will actively attempt to negotiate to convert the link into a trunk.

Question 65 of 417

65. Question

If you configure syslog messages without specifying the logging trap level, which log messages will the router send ?

66. Question

Which command can you execute to set the user inactivity timer to 10 seconds?

SW1(config-line)#exec-timeout 0 10

SW1(config-line)#exec-timeout 10

SW1(config-line)#absolute-timeout 0 10

SW1(config-line)#absolute-timeout 10

Correct

Incorrect

Question 67 of 417

67. Question

Which standards-based First Hop Redundancy Protocol is a Cisco supported alternative to Hot Standby Router Protocol?

VRRP

GLBP

TFTP

DHCP

Correct

Incorrect

Question 68 of 417

68. Question

Two hosts are attached to a switch with the default configuration. Which statement about the configuration is true?

IP routing must be enabled to allow the two hosts to communicate.

The two hosts are in the same broadcast domain.

The switch must be configured with a VLAN to allow the two hosts to communicate.

Port security prevents the hosts from connecting to the switch.

Correct

Incorrect

Question 69 of 417

69. Question

If there are 3 hosts connected in one port of a switch and two other hosts connected in another port, how many collision domains are present on the router?

5

2

3

4

Correct

Incorrect

Question 70 of 417

70. Question

What are three parts of an IPv6 global unicast address? (Choose three.)

an interface ID that is used to identify the local host on the network.

an interface ID that is used to identify the local network for a particular host.

a subnet ID that is used to identify networks inside of the local enterprise site

a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP

a global routing prefix that is used to identify the portion of the network address provided by a local administrator

Correct

Incorrect

Question 71 of 417

71. Question

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement?

192.168.252.0 255.255.255.252

192.168.252.8 255.255.255.248

192.168.252.8 255.255.255.252

192.168.252.16 255.255.255.240

192.168.252.16 255.255.255.252

Correct

Incorrect

Question 72 of 417

72. Question

What parameter can be different on ports within an EtherChannel?

speed

DTP negotiation settings

trunk encapsulation

duplex

Correct

Incorrect

Question 73 of 417

73. Question

Which two statements about IPv6 router advertisement messages are true? (Choose two.)

They use ICMPv6 type 134.

The advertised prefix length must be 64 bits.

The advertised prefix length must be 48 bits.

They are sourced from the configured IPv6 interface address.

Their destination is always the link-local address of the neighboring node.

The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the
maximum defined.

The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN

Correct

Incorrect

Question 76 of 417

76. Question

Which switching method duplicates the first six bytes of a frame before making a switching decision?

fragment-free switching

store-and-forward switching

cut-through switching

ASIC switching

Correct

Incorrect

Question 77 of 417

77. Question

Which logging command can enable administrators to correlate syslog messages with millisecond precision?

no logging console

logging buffered 4

no logging monitor

service timestamps log datetime mscec

logging host 10.2.0.21

Correct

Incorrect

Question 78 of 417

78. Question

Which three statements about link-state routing are true? (Choose three.)

OSPF is a link-state protocol.

Updates are sent to a broadcast address.

It uses split horizon.

Routes are updated when a change in topology occurs.

RIP is a link-state protocol.

Updates are sent to a multicast address by default.

Correct

Incorrect

Question 79 of 417

79. Question

Which command can you enter to determine whether a switch is operating in trunking mode?

show ip interface brief

show vlan

show interfaces

show interface switchport

Correct

Incorrect

Question 80 of 417

80. Question

Which command can you enter to view the ports that are assigned to VLAN 20 ?

Switch#show ip interface vlan 20

Switch#show vlan id 20

Switch#show ip interface brief

Switch#show interface vlan 20

Correct

Incorrect

Question 81 of 417

81. Question

In which two formats can the IPv6 address fd15:0db8:0000:0000:0700:0003:400F:572B be written? (Choose two.)

fd15:0db8:0000:0000:700:3:400F:527B

fd15::db8::700:3:400F:527B

fd15:db8:0::700:3:4F:527B

fd15:0db8::7:3:4F:527B

fd15:db8::700:3:400F:572B

Correct

Incorrect

Question 82 of 417

82. Question

Which function of the IP SLAs ICMP jitter operation can you use to determine whether a VoIP issue is caused by excessive end-to-end time?

packet loss

jitter

successive packet loss

round-trip time latency

Correct

Incorrect

Question 83 of 417

83. Question

Refer to the exhibit.

Which of these statements correctly describes the state of the switch once the boot process has been completed?

A. The switch will need a different IOS code in order to support VLANs and ST.

Remote access management of this switch will not be possible without configuration change.

As FastEthernet0/12 will be the last to come up, it will be blocked by STP.

More VLANs will need to be created for this switch.

Correct

Incorrect

Question 84 of 417

84. Question

Refer to the exhibit.

The network administrator normally establishes a Telnet session with the switch from host A. However, host A is
unavailable. The administrator’s attempt to telnet to the switch from host fails, but pings to the other two hosts are
successful. What is the issue?

The switch interfaces need the appropriate IP addresses assigned.

Host and the switch need to be in the same subnet.

The switch needs an appropriate default gateway assigned.

The switch interface connected to the router is down.

Host needs to be assigned an IP address in VLAN 1.

Correct

Incorrect

Question 85 of 417

85. Question

Which condition does the err-disabled status indicate on an Ethernet interface?

There is a duplex mismatch.

The device at the other end of the connection is powered off.

The serial interface is disabled.

The interface is configured with the shutdown command.

Port security has disabled the interface.

The interface is fully functioning.

Correct

Incorrect

Question 86 of 417

86. Question

Refer to the exhibit

All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should
be used for Link A and Network A? (Choose two.)

Link A ­ 172.16.3.0/30

Link A ­ 172.16.3.112/30

Network A ­ 172.16.3.48/26

Network A ­ 172.16.3.128/25

Link A ­ 172.16.3.40/30

Network A ­ 172.16.3.192/26

Correct

Incorrect

Question 87 of 417

87. Question

Which type of device can be replaced by the use of subinterfaces for VLAN routing ?

Layer 2 bridge

Layer 2 switch

Layer 3 switch

router

Correct

Incorrect

Question 88 of 417

88. Question

Which statement about LLDP is true?

It is a Cisco proprietary protocol.

It is configured in global configuration mode.

The LLDP update frequency is a fixed value.

It runs over the transport layer.

Correct

Incorrect

Question 89 of 417

89. Question

If the primary root bridge experiences a power loss, which switch takes over?

switch 0040.00.90C5

switch 00E0.F90B.6BE3

switch 0004.9A1A.C182

switch 00E0.F726.3DC6

Correct

Incorrect

Question 90 of 417

90. Question

A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?

Router# show ip eigrp neighbors

Router# show ip eigrp interfaces

Router# show ip eigrp adjacency

Router# show ip eigrp topology

Correct

Incorrect

Question 91 of 417

91. Question

Which three statements about IPv6 prefixes are true? (Choose three.)

FEC0::/10 is used for IPv6 broadcast.

FC00::/7 is used in private networks.

FE80::/8 is used for link-local unicast.

FE80::/10 is used for link-local unicast.

2001::1/127 is used for loopback addresses.

FF00::/8 is used for IPv6 multicast.

Correct

Incorrect

Question 92 of 417

92. Question

Which command can you enter to display duplicate IP addresses that the DHCP server assigns?

show ip dhcp conflict 10.0.2.12

show ip dhcp database 10.0.2.12

show ip dhcp server statistics

show ip dhcp binding 10.0.2.12

Correct

Incorrect

Question 93 of 417

93. Question

Which three ports will be STP designated ports if all the links are operating at the same bandwidth? (Choose three.)

Switch B - F0/0

Switch A - Fa0/1

Switch B - Fa0/l

Switch C - F0/1

Switch A - Fa0/0

Switch C - Fa0/0

Correct

Incorrect

Question 94 of 417

94. Question

Refer to the exhibit

The network administrator cannot connect to Switch 1 over a Telnet session, although the hosts attached to Switch1 can ping the interface Fa0/0 of the router. Given the information in the graphic and assuming that the router and Switch2 are configured properly, which of the following commands should be issued on Switch1 to correct this problem?

95. Question

Refer to the exhibit.

Each of these four switches has been configured with a hostname, as well as being configured to run RSTP.No other configuration changes have been made. Which three of these show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.)

SwitchD. Gi0/2, root

SwitchA, Fa0/2, designated

SwitchB, Gi0/l, designated

SwitchA, Fa0/l, root

SwitchB, Gi0/2, root

SwitchC, Fa0/2, root

Correct

Incorrect

Question 96 of 417

96. Question

Which feature builds a FIB and an adjacency table to expedite packet forwarding?

cut through

fast switching

process switching

Cisco Express Forwarding

Correct

Incorrect

Question 97 of 417

97. Question

Which command can you enter to verify that a 128-bit address is live and responding?

traceroute

telnet

ping

show ipv6

Correct

Incorrect

Question 98 of 417

98. Question

What are two reasons that duplex mismatches can be difficult to diagnose? (Choose two.)

The interface displays a connected (up/up) state even when the duplex settings are mismatched.

1-Gbps interfaces are full-duplex by default.

Full-duplex interfaces use CSMA/CD logic, so mismatches may be disguised by collisions.

The symptoms of a duplex mismatch may be intermittent.

Autonegotiation is disabled.

Correct

Incorrect

Question 99 of 417

99. Question

Which condition indicates that service password-encryption is enabled?

The local username password is in clear text in the configuration.

The enable secret is in clear text in the configuration.

The local username password is encrypted in the configuration.

The enable secret is encrypted in the configuration.

Correct

Incorrect

Question 100 of 417

100. Question

Which protocol advertises a virtual IP address to facilitate transparent failover of a Cisco routing device?

FHRP

DHCP

RSMLT

ESRP

Correct

Incorrect

Question 101 of 417

101. Question

What is the correct routing match to reach 172.16.1.5/32 ?

172.16.1.0/26

172.16.1.0/25

172.16.1.0/24

the default route

Correct

Incorrect

Question 102 of 417

102. Question

Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?

transport

network

presentation

session

application

Correct

Incorrect

Question 103 of 417

103. Question

What is the purpose of the POST operation on a router ?

determine whether additional hardware has been added

locate an IOS image for booting

enable a TFTP server

set the configuration register

Correct

Incorrect

Question 104 of 417

104. Question

Which protocol is the Cisco proprietary implementation of FHRP ?

HSRP

VRRP

GLBP

CARP

Correct

Incorrect

Question 105 of 417

105. Question

Which three characteristics are representative of a link-state routing protocol? (Choose three.)

provides common view of entire topology

exchanges routing tables with neighbors

calculates shortest path

utilizes event-triggered updates

utilizes frequent periodic updates

Correct

Incorrect

Question 106 of 417

106. Question

Which part of the PPPoE server configuration contains the information used to assign an IP address to a PPPoE client?

virtual-template interface

DHCP

dialer interface

AAA authentication

Correct

Incorrect

Question 107 of 417

107. Question

Drag and drop

Sort elements

All Nodes (link-local)

OSPFv3 Routers

OSPFv3 Designated Routers

EIGRPv3 Routers

PIM Routers

All Routers (site-local)

FF02::1

FF02::5

FF02::6

FF02::A

FF02::D

FF05::2

Correct

Incorrect

Question 108 of 417

108. Question

Which three statements about RSTP are true? (Choose three.)

RSTP sig

RSTP expands the STP port roles by adding the alternate and backup roles.

RSTP port states are blocking, discarding, learning, or forwarding.

RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.

RSTP also uses the STP proposal-agreement sequence.

RSTP uses the same timer-based process as STP on point-to-point links

Correct

Incorrect

Question 109 of 417

109. Question

What are two benefits of using NAT? (Choose two.)

NAT facilitates end-to-end communication when IPsec is enabled.

NAT eliminates the need to re-address all hosts that require external access.

NAT conserves addresses through host MAC-level multiplexing.

Dynamic NAT facilitates connections from the outside of the network.

NAT accelerates the routing process because no modifications are made on the packets.

NAT protects network security because private networks are not advertised.

Correct

Incorrect

Question 110 of 417

110. Question

Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two.)

SW1#show port-secure interface FastEthernet 0/12

SW1#show switchport port-secure interface FastEthernet 0/12

SW1#show running-config

SW1#show port-security interface FastEthernet 0/12

SW1#show switchport port-security interface FastEthernet 0/12

Correct

Incorrect

Question 111 of 417

111. Question

Refer to the exhibit. Given this output for SwitchC, what should the network administrator’s next action be?

Check the trunk encapsulation mode for Switch C's fa0/1 port.

Check the duplex mode for Switch C's fa0/1 port.

Check the duplex mode for Switch A's fa0/2 port.

Check the trunk encapsulation mode for Switch A's fa0/2 port

Correct

Incorrect

Question 112 of 417

112. Question

Which statement is correct regarding the operation of DHCP ?

A DHCP client uses a ping to detect address conflicts.

A DHCP server uses a gratuitous ARP to detect DHCP clients.

A DHCP client uses a gratuitous ARP to detect a DHCP server.

If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.

If an address conflict is detected, the address is removed from the pool for an amount of time configurable by the administrator.

If an address conflict is detected, the address is removed from the pool and will not be reused until the server is rebooted.

Correct

Incorrect

Question 113 of 417

113. Question

Which two statements about using the CHAP authentication mechanism in a PPP link are true ? (Choose two.)

CHAP uses a two-way handshake.

CHAP uses a three-way handshake.

CHAP authentication periodically occurs after link establishment.

CHAP authentication passwords are sent in plaintext.

CHAP authentication is performed only upon link establishment.

CHAP has no protection from playback attacks.

Correct

Incorrect

Question 114 of 417

114. Question

Refer to the exhibit. Switch port FastEthernet 0/24 on ALSwitch1 will be used to create an IEEE 802.1Q-compliant trunk to another switch. Based on the output shown, what is the reason the trunk does not form, even though the proper cabling has been attached?

VLANs have not been created yet.

An IP address must be configured for the port.

The port is currently configured for access mode.

The correct encapsulation type has not been configured.

The no shutdown command has not been entered for the port.

Correct

Incorrect

Question 115 of 417

115. Question

Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands. Which two of these changes are necessary for SwitchA to meet the requirements? (Choose two.)

Port security needs to be globally enabled.

Port security needs to be enabled on the interface.

Port security needs to be configured to shut down the interface in the event of a violation.

Port security needs to be configured to allow only one learned MAC address.

Port security interface counters need to be cleared before using the show command.

The port security configuration needs to be saved to NVRAM before it can become active.

Correct

Incorrect

Question 116 of 417

116. Question

Which three statements about static routing are true? (Choose three.)

It uses consistent route determination.

It is best used for small-scale deployments.

Routing is disrupted when links fail.

It requires more resources than other routing methods.

It is best used for large-scale deployments.

Routers can use update messages to reroute when links fail.

Correct

Incorrect

Question 117 of 417

117. Question

What are the address that will show at the show ip route if we configure the above statements? (Choose Three.)

10.0.0.0

10.4.3.0

172.15.4.0

172.15.0.0

192.168.4.0

192.168.0.0

Correct

Incorrect

Question 118 of 417

118. Question

Which feature facilitates the tagging of frames on a specific VLAN ?

Routing

Hairpinning

Encapsulation

Switching

Correct

Incorrect

Question 119 of 417

119. Question

What does split horizon prevent?

routing loops, link state

routing loops, distance vector

switching loops, STP

switching loops, VTP

Correct

Incorrect

Question 120 of 417

120. Question

Which value to use in HSRP protocol election process ?

interface

virtual IP address

priority

router ID

Correct

Incorrect

Question 121 of 417

121. Question

Which of the following is needed to be enable back the role of active in HSRP ?

preempt

priority

other options

other options

Correct

Incorrect

Question 122 of 417

122. Question

Which command is used to show the interface status of a router ?

show interface status

show ip interface brief

show ip route

show interface

Correct

Incorrect

Question 123 of 417

123. Question

Which of the following privilege level is the most secured ?

Level 0

Level 1

Level 15

Level 16

Correct

Incorrect

Question 124 of 417

124. Question

Which IPV6 feature is supported in IPV4 but is not commonly used ?

unicast

multicast

anycast

broadcast

Correct

Incorrect

Question 125 of 417

125. Question

Which two statements are true about IPv6 Unique Local Addresses ? (Choose Two.)

It is the counterpart of IPv4 private addresses

It uses FC00::/7 as prefix

wrong

wrong

Correct

Incorrect

Question 126 of 417

126. Question

Which range represents the standard access list ?

99

150

299

2000

Correct

Incorrect

Question 127 of 417

127. Question

What to do when the router password was forgotten ?

use default password cisco to reset

access router physically

use ssl/vpn

Type confreg 0x2142 at the rommon 1

Correct

Incorrect

Question 128 of 417

128. Question

What is true about Cisco Discovery Protocol ?

it discovers the routers, switches and gateways.

it is network layer protocol

it is physical and data link layer protocol

it is proprietary protocol

Correct

Incorrect

Question 129 of 417

129. Question

Which of the following encrypts the traffic on a leased line ?

telnet

ssh

vtp

vpn

dmvpn

Correct

Incorrect

Question 130 of 417

130. Question

Fill in the blank.

How do you configure a hostname ? (Router(config)#hostname R1)

Correct

Incorrect

Question 131 of 417

131. Question

How do you maintain security in multiple websites?

vpn

dmvpn

other

other

Correct

Incorrect

Question 132 of 417

132. Question

Refer to the exhibit. Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4. What will Switch-1 do with this data?

Switch-1 will drop the data because it does not have an entry for that MAC address.

Switch-1 will flood the data out all of its ports except the port from which the data originated.

Switch-1 will send an ARP request out all its ports except the port from which the data originated.